Skip to main content

A Highly Efficient Intrusion Detection Method Based on Hierarchical Extreme Learning Machine

  • Conference paper
  • First Online:
Proceedings of ELM-2017 (ELM 2017)

Part of the book series: Proceedings in Adaptation, Learning and Optimization ((PALO,volume 10))

Included in the following conference series:

  • 290 Accesses

Abstract

Cyber security is becoming more and more concerned by people nowadays. Intrusion detection systems (IDSs) is a major approach to ensure the confidentiality, integrity and availability of network system resources. There are many machine learning techniques applied to IDSs. In this paper, we propose a novel and rapid technique based on Hierarchical Extreme Learning Machine (H-ELM) for intrusion detection. We use NSL-KDD 2009 dataset to evaluate our method. Comparing our method with other widely used machine learning methods such as k-Nearest Neighbor (k-NN), Random Forest (RF) and Extreme Learning Machine (ELM), the experimental results show that H-ELM can perform better than or similar to other methods in overall accuracy of 72.87%, while only spends a total time of 2.04 s which is much faster than other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Singh, R., Kumar, H., Singla, R.K.: An intrusion detection system using network traffic profiling and online sequential extreme learning machine. Expert Syst. Appl. 42(22), 8609–8624 (2015)

    Article  Google Scholar 

  2. Liu, Q., Yin, J., Leung, V.C.M., Cai, Z.: FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs. IEEE Trans. Wirel. Commun. 12(10), 5124–5137 (2013)

    Article  Google Scholar 

  3. Ambusaidi, M., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016)

    Article  MathSciNet  Google Scholar 

  4. Chen, Y., Abraham, A., Yang, B.: Hybrid Flexible Neural-Tree-Based Intrusion Detection Systems: Research Articles. Wiley (2007)

    Google Scholar 

  5. Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2017)

    Article  Google Scholar 

  6. Sarasamma, S.T., Zhu, Q.A., Huff, J.: Hierarchical kohonenen net for anomaly detection in network security. IEEE Trans. Syst. Man Cybern. Part B Cybern. 35(2), 302–12 (2005)

    Article  Google Scholar 

  7. Lin, W.C., Ke, S.W., Tsai, C.F.: CANN: an intrusion detection system based on combining cluster centers and nearest neighbors. Knowl. Based Syst. 78(1), 13–21 (2015)

    Article  Google Scholar 

  8. Zhang, L., Zhang, D., Tian, F.: SVM and ELM: Who Wins? Object Recognition with Deep Convolutional Features from ImageNet. Springer International Publishing (2016)

    Google Scholar 

  9. Huang, G.B., Zhu, Q.Y., Siew, C.K.: Extreme learning machine: theory and applications. Neurocomputing 70(1), 489–501 (2006)

    Article  Google Scholar 

  10. Liu, Q., Yin, J., Leung, V.C.M., Zhai, J.H., Cai, Z., Lin, J.: Applying a new localized generalization error model to design neural networks trained with extreme learning machine. Neural Comput. Appl. 27(1), 59–66 (2016)

    Article  Google Scholar 

  11. Tang, J., Deng, C., Huang, G.B.: Extreme learning machine for multilayer perceptron. IEEE Trans. Neural Netw. Learn. Syst. 27(4), 809–821 (2017)

    Article  MathSciNet  Google Scholar 

  12. Liu, Q., Zhou, S., Zhu, C., Liu, X., Yin, J.: MI-ELM: highly efficient multi-instance learning based on hierarchical extreme learning machine. Neurocomputing 173, 1044–1053 (2015)

    Article  Google Scholar 

  13. Tsai, C.F., Hsu, Y.F., Lin., Lin, W.Y.: Intrusion detection by machine learning: a review. Expert Syst. Appl. 36(10), 11994–12000 (2009)

    Article  Google Scholar 

  14. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: IEEE International Conference on Computational Intelligence for Security Defense Applications, pp. 1–6 (2009)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant No. 61772561) and the Key Research & Development Plan of Hunan Province (Grant No. 2018NK2012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Linyuan Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, L., Liu, Y., Zhao, W., Liu, Q., Qin, J. (2019). A Highly Efficient Intrusion Detection Method Based on Hierarchical Extreme Learning Machine. In: Cao, J., Vong, C., Miche, Y., Lendasse, A. (eds) Proceedings of ELM-2017. ELM 2017. Proceedings in Adaptation, Learning and Optimization, vol 10. Springer, Cham. https://doi.org/10.1007/978-3-030-01520-6_29

Download citation

Publish with us

Policies and ethics